An Efficient Restricting of bad Users among Unidentified Users in a Network
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2013, Vol 3, Issue 7
Abstract
In this paper, we develop a new system to enable service providers, such as website operators, on the Internet to restrict past abusive users of anonymizing networks (for example, Tor) from further causing trouble behavior, without compromising their security , and while maintain the security of all of the uncorrupt users. This system provides a security-preserving analogy of IP address banning, and is modeled after the well-known Nymble system. Nymble is a system that provides a restricting mechanism to a server to protect it from unauthorized users connecting through anonymizing networks such as Tor. Anonymous networks allow anyone to visit the public locations of the network. With this users access the Internet services through a series of routers. , this hides the user’s fact of remaining the same one and IP address from the server. This is the advantage for the disruptive behaviouring users to destroy popular websites. To avoid this, servers may try to block the bad user, but it is not possible in case of anonymous networks. In such categories , if the abuser routes through to carry out network, administrators restrict all known exit nodes of to carry out networks, denying anonymous access to disruptive misbehaving and behaving users. To conflict this problem, a nymble system is designed in which servers can suspicion the bad users without compromising their quality. This paper explains the idea that the different service providers have different suspicioning policies. For example, Wikipedia might want to obstruction a user one day for the first disruptive misbehavior, one week for the second one, etc. In order to do this, we have to propose a dynamic link ability window whose length can be increased exponentially. Thus, at the start of each likability window, all service providers must reset their suspicions and forgive all prior disruptive misbehavior.
Authors and Affiliations
Shaik Shabana , M. Chandra Naik
Performance Comparison of Eigen-faces vs. Fisher-faces for Face Recognition
Face recognition issue gained more interest recently due to its various applications and the demand of high security. In this paper two Face Recognition techniques, Eigen-faces commonly called Principal Component Analysi...
FPGA based implementation of Interoperability of Wireless mesh Network and Wi-Fi
Wireless Mesh Networks (WMNs) is a key technology for next generation wireless networks, showing rapid progress and many new inspiring applications. IEEE 802.11s is the standard defined for WLAN mesh networks.One importa...
Effect of Couple Stress Fluid on Peristaltic Motion in a Uniform and Non-Uniform Annulus
Peristalsis is now well known to physiologists to be one of the major mechanisms for fluid transport in many biological systems. In particular, a mechanism may be involved in swallowing food through the esophagus, in uri...
Table Detection and Extraction from Image Document
Tables make information easier to understand and perceive than regular text block. Now days, it becomes popular structure for information representation. Format of tables differs and change according to need of rep...